Top Banner
1 Demystifying Mobile Security Aliza Kasim Research Analyst ICT Practice, Frost & Sullivan
24

Demystifying Mobile Security

May 19, 2015

Download

Business

Frost & Sullivan Analyst Briefing on Demystifying Mobile Security
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Demystifying Mobile Security

1

Demystifying Mobile Security

Aliza Kasim

Research Analyst

ICT Practice, Frost & Sullivan

Page 2: Demystifying Mobile Security

2

Table of Content

The Rise of Mobility

Transformation of the Enterprise

The Need for Mobile Security

Mobile Security Future Outlook

Page 3: Demystifying Mobile Security

3

Transformation of the Enterprise

The Need for Mobile Security

Mobile Security Future Outlook

The Rise of Mobility

Page 4: Demystifying Mobile Security

4

Computing and Mobility Coming Together

1970s1960s 1980s 1990s 2000

MainframeSupercomputer

2010

Smart Phones &

Tablets

Personal Computer

Laptop/Notebook

Mobile Phone (2G)

Page 5: Demystifying Mobile Security

5

Source: Frost & Sullivan.

Merely for basic use like talk-time and texting

Integration of camera with the mobile phone. Users starting to use share images, videos, audio and rich text

Mobile phone has evolve into video phones and have video clip functionality and companies starting to setup websites like Youtube, Bebo and MySpace

Mobile phone became the mobile internet whereby it starting to use the Wireless Access Protocol (WAP). Starting to turn into basic computer and turned into a mini super computer soon after

Mobile devices evolved into the tablet which have higher capability. Works like the notebook or laptop with higher mobility and smaller in size

The Rise of Mobile Devices

Page 6: Demystifying Mobile Security

6

Mobile Device Capabilities

Basic Services Complex

Services

Consumer Applications

Enterprise Applications

Web & Social Media

Cloud

Page 7: Demystifying Mobile Security

7

Transformation of the Enterprise

The Rise of Mobility

The Need for Mobile Security

Mobile Security Future Outlook

Transformation of the Enterprise

Page 8: Demystifying Mobile Security

8

The Role of the Individual

Facebook user, forum contributor

Human Individual

Public Domain

Personal Domain

Professional Domain

Employee, mobile worker, remote user

Home user, website blogger

Page 9: Demystifying Mobile Security

9

The Era of Mobile Enterprise

Fixed, slow and limited connectivity

Devices are provided and given by the cooperation

Devices are fixed and not movable

Enteprise has full control

Security within the corporate network

Always connected...everywhere

Devices chosen by the users

Devices are mobile

Highly empowered users

Securing a dynamic network

Moving from: To:

Page 10: Demystifying Mobile Security

10

MOBILE ENTERPRISE

Mobility Factor

BUSINESS USER

• Competitiveness• Productivity

• Customer reach• Speed of delivery

• Globalization

• Consumerization• Travel more • More savvy

• More option on mobile devices • More convenient

TECHNOLOGY

• High speed connection

• Cheaper bandwidth • Applications

Page 11: Demystifying Mobile Security

11

Challenges for the Enterprise

• How does the enterprise have control over these devices?

Explosion of Mobile Device

Page 12: Demystifying Mobile Security

12

The Need for Mobile Security

The Rise of Mobility

Transformation of the Enterprise

Mobile Security Future Outlook

The Need for Mobile Security

Page 13: Demystifying Mobile Security

13

Major Security Risks

MobileSecurity Risks

WEB-BASED ATTACKS

UNSECURED NETWORK

BACKDOOR TO ENTEPRISE NETWORK

DEVICE BREACHESDATA LOSS AND

INTEGRITY

NETWORK AND SYSTEM ABUSE

MALICIOUS SOFTWARE

LOST OR STOLEN MOBILE DEVICES

Page 14: Demystifying Mobile Security

14

Adoption Trends in Mobile Security

Lack of Clear Market Definition

Market Restraints

Device-centric vs User-centric

Exploratory Mindset towards Mobile Security

Adoption Trends

Uncertain Attitudes towards Mobility

Factor

Traditional Outlook towards Information

Security

Extension of Existing Security Strategy

Page 15: Demystifying Mobile Security

15

What is Mobile Security?

MALWARE PROTECTION

DEVICE MANAGEMENT

ACCESS MANAGEMENT

DATA PROTECTION

APPLICATION MONITORING

& CONTROL

Page 16: Demystifying Mobile Security

16

What Should be Secured?

Device

Lock

Wipe

Locate

Data

Encryption

File Protection

Data leakages

Authentication

Management policies

Application

Rogue Applications

Visibility on Applications

Controls over Applications

User

Profiling

Location of the User

Mobile Security

Page 17: Demystifying Mobile Security

17

What Enterprise Should Do…

POLICIES & FRAMEWORK

AUTHENTICATE USERS & DEVICES

ENCRYPTION

MONITORING &

MANAGEMENT

SECURE CONNECTION

EDUCATING & AWARENESS

Securing Enterprise

Page 18: Demystifying Mobile Security

18

Mobile Security Future Outlook

The Rise of Mobility

Transformation of the Enterprise

The Need for Mobile Security

Mobile Security Future Outlook

Page 19: Demystifying Mobile Security

19

Mobile Security Market: Revenue Forecasts (APAC), 2010-2013

2010 2011 2012 20130

10

20

30

40

50

60

0

0.2

0.4

0.6

0.8

17.621.9

30.2

51.324.4%

37.9%

69.9%

Revenue YoY Growth

Reve

nue

(Mill

ion)

YoY

Gro

wth

Source: Frost & Sullivan

CAGR: 42.8%

Revenue Forecast

Page 20: Demystifying Mobile Security

20

Market Opportunities in Mobile Security

India

Japan

China

South Korea

Low Opportunity High OpportunityFuture Revenue Opportunity

Low

Hig

hC

AG

R

Australia

New Zealand

Hong Kong

Singapore

MalaysiaTaiwan

Philippines

Indonesia

Thailand

Vietnam

Source: Frost & Sullivan

Advanced in terms of technology with 3G and 4G connection

High level of awareness and

government support

Still lagging behind but adoption rate is getting

higher

Price for mobile broadband is still

markedly expensive

Vast adoption of mobile devices

Page 21: Demystifying Mobile Security

21

Mobile Security Players

VSMOBILE DEVICE MANAGEMENT PLAYER

INFORMATION SECURITY PLAYER

• Device-centric• Focus on the device

• Management of the device

• Network-centric• Treating mobile devices as part of the network

• Mobile security is treated as an extension to end-point security

Page 22: Demystifying Mobile Security

22

Future of Mobile Security

Devices

Users Experience

Mobile Applications

Centralized Platforms

Managed Devices

Page 23: Demystifying Mobile Security

23

http://twitter.com/frost_sullivan

Follow Frost & Sullivan on Facebook, LinkedIn, SlideShare, and Twitter

http://www.facebook.com/pages/Frost-Sullivan/249995031751?ref=ts

http://www.linkedin.com/companies/4506

http://www.slideshare.net/FrostandSullivan

Page 24: Demystifying Mobile Security

24

For Additional Information

Donna JeremiahCorporate CommunicationsAsia Pacific+603 6204 [email protected]

Carrie LowCorporate CommunicationsAsia Pacific+603 6204 [email protected]

Aliza KasimResearch AnalystICT+603 6205 [email protected]